Curso impartido en Español

Security Administrator & Engineering Bundle R80

5.0
1 opinión
  • Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
    |

Capacitación laboral

En Miguel Hidalgo

$ 102,251 más IVA

*Precio estimado

Importe original en USD:

$ 5,092

Descripción

  • Tipología

    Capacitación laboral

  • Nivel

    Nivel avanzado

  • Lugar

    Miguel hidalgo

  • Horas lectivas

    45h

  • Duración

    5 Días

  • Inicio

    Fechas disponibles

Descripción

Five days course covers everything you need to start up, configure and manage daily operationd of Check Point Security and Management Software Blades Systems on the GAIA operating system.

Sedes y fechas disponibles

Ubicación

Inicio

Miguel Hidalgo (Ciudad de México (Distrito Federal))
Ver mapa
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700

Inicio

Fechas disponiblesInscripciones abiertas
Fechas disponiblesInscripciones abiertas
Fechas disponiblesInscripciones abiertas

Acerca de este curso

Los participantes aprenderán a instalar y configurar un Security Gateway, conocerán las Politicas de Seguridad y podrán administrar y monitorear una red segura. Conceptos avanzados del Firewall, Conceptos Avanzados de Alta Disponibilidad, Conceptos Avanzados de Reporte y Auditoria.

A personas que administran los productos de Check Point, Administradores de Sistemas, Administradores de Seguridad, quienes se preparan para las certificaciones CCSA y CCSE.

•Basic knowledge of networking •Windows Server and/or UNIX skills •Internet and TCP/IP experience

Al terminar el curso se les proporciona un diploma con valor curricular.

Somos el único centro autorizado en México para impartir los cursos. Al tomar el curso entenderán los conceptos de alta disponibilidad, conceptos de reporte y auditoria, conceptos avanzados de migración y respaldos.

Se enviará la información por correo y se les llamará para confirmar que hayan recibido la información, es muy importante que proporcionen un número telefónico celular o fijo, esto es para darle seguimiento a la solicitud

Preguntas & Respuestas

Plantea tus dudas y otros usuarios podrán responderte

¿Quién quieres que te responda?

Sólo publicaremos tu nombre y pregunta

Opiniones

5.0
  • Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
    |
100%
5.0
excelente

Valoración del curso

Lo recomiendan

Valoración del Centro

Juan Hernández

5.0
01/06/2016
Lo mejor: Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
A mejorar: Nada.
¿Recomendarías este curso?:
* Reseñas reunidas por Emagister & iAgora

Materias

  • Backup your Security Gateway and Management Server
  • •Upgrade and troubleshoot a Management Server
  • •Build test and troubleshoot a clustered Security Gateway
  • Gateways
  • Firewall
  • Seguridad de redes
  • Seguridad informática
  • Check Point
  • Clustering
  • Informática
  • Informática avanzada
  • Ingeniería informática
  • Unix
  • Windows

Profesores

Hector Solis

Hector Solis

Gerente de TI

Programa académico

COURSE TOPICS

▪ Course Layout

▪ Prerequisites

▪ Certification Title

▪ Course Chapters and Learning Objectives

▪ Sample Setup for Labs

 Introduction to Check Point Technology

▪ Concept of a Firewall

 Open Systems Interconnect Model

 Transmission Control Protocol/ Internet Protocol Model

▪ Controlling Network Traffic

 Packet Filtering

 Stateful Inspection

 Application Layer Firewall

▪ Network Communication

 Secure Internal Communication

▪ The Check Point Security Management Architecture

 SmartConsole

 Security Management Server

 Security Gateway

▪ The SmartConsole

 Gateways & Servers View

 Security Policies View

 Logs & Monitor View

 Manage & Setting View

▪ SmartConsole Applications

 SmartEvent (Advanced Events and Reports)

 SmartView Monitor ( Tunel & User Monitoring)

 SmartUpdate

 SmartDashboard

▪ Deployment Platforms

 Check Point Appliances

 Open Servers

▪ Deployment Considerations

 Standalone

 Distributed

 Bridge Mode

▪ Introduction to the Gaia Operating System

 Command Line Interface

 WebUI

 Users

 Updates

 Security Policy Management

▪ Introduction to the Security Policy

 Rules

 Objects

 Anti- Spoofing

 The Rule Base

 Global Properties

 Sections

 Publish Policy

▪ Policy Packages

 Policy Types

 Unified Policies

 Shared Policies

 Additional Policy Management Tools

▪ Install Policy

 Install Policy Package

▪ Network Address Translation

 Hide NAT

 Static NAT

▪ Administration

 Permission Profiles

 Sessions

 Data Revisions

 Concurrent Administration

▪ Managing Remote Gateways

▪ Backups

 Performing Backups

 Policy Layers

▪ Policy Layer Concept

 Policy Layers

 Access Control Policy Layers

 Threat Prevention Policy Layers

 Layers and Policy Packages Example

 Best Practices

▪ Managing the Application Control Policy Layer

 Application Control Software Blade

 URL Filtering Software Blade

 Creating an Application Control and URL Filtering Policy

▪ Review Questions

 Check Point Security Solutions and Licensing

 Check Point Software Blade Architecture

 Security Gateway Software Blades

Advanced Threat Prevention Software Blades

 Management Software Blades for Policy Management

 Management Software Blades for Monitoring Analysis

 Management Software Blades for Operations and Workflow

 Endpoint Software Blades

 Software Blade Packages

▪ Licensing Overview

 Components of a Licenses

 Perpetual versus Subscription Blades

 Central and Local Licenses

 License Activation

 Hardware Licenses

▪ SmartUpdate

 SmartUpdate Architecture

 Using SmartUpdate

 Package Repository

▪ Managing Licenses

 Add and Install Licenses

 Attaching and Detaching Licenses

 New Licenses

 View Licenses Properties

 Export a License

 License Status

 Service Contracts

▪ License Reports

 Traffic Visibility

▪ Analyzing Logs

 Collecting Information

 Deploy Logging

 Configure Logging

 SmartConsole Logs View

 Tracking Rules

 Examining Logs

 Predefined Logs Queries

 Query Language Overview

▪ Monitoring Traffic and Conections

 SmartView Monitor and SmartConsole

 Monitoring and Handling Alerts

 Monitoring Suspicious Activity Rules

 Monitoring Gateway Status

 Users View

 System Counters View

 Tunnels View

 Cooperative Enforcement View

 Traffic View

 Basic Concepts of VPN

▪ Introduction to VPN

 IPSec VPN

 VPN Components

▪ VPN Deployments

 SITE-TO-Site VPN Deployments

N Communities

 Meshed VPN Community

 Star VPN Community

 Combination VPN Communities

 Remote Access VPN Community Object

▪ Access Control for VPN Connections

 Allow All Connections

 Allow All Site-to-Site VPN Connections

 Allow Specific VPN Communities

 Site-to-Site Communities- Allow All Encrypted Traffic

▪ Tunnel Management and Monitoring

 Permanent VPN Tunnels

 Tunnel Testing

 Monitoring VPN Tunnels

 Managing User Access

▪ Overview of User Management Components

 User Directory

 Identity Awareness

▪ Managing Users

 SmartConsole and User Database

 LDAP and User Directory

▪ Authenticating Users

 Authentication Schemes

▪ Managing User Access

 Access Roles

 Rule Bse

 Captive Portal for Guest Access

 Working with Cluster XL

▪ Overview of Cluster XL

▪ ClusterXL Deployments

 High Availability Deployment

▪ Failovers

 Performing a Manual Failover

▪ Synchronizing Cluster Connections

 Securing the Sync Interface

 Clock Synchronization

▪ Monitoring a Cluster

 SmartView Monitor

 Administrator Task Implementation

▪ Compliance Software Blade

 Best Practices

 Continuous Compliance Monitoring

▪ CPView

 User Interface

▪ Appendix

Llama al centro

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti, y podrás financiarlo en cómodas cuotas mensuales.

Security Administrator & Engineering Bundle R80

$ 102,251 más IVA

*Precio estimado

Importe original en USD:

$ 5,092